General

  • Target

    XClient.exe

  • Size

    164KB

  • MD5

    fde3fc00f7b369d7009508a2012f9127

  • SHA1

    fe95f2e41a7cbe077f15452d7e215797ed0d5e77

  • SHA256

    da1dde57c79f65733c203ed09d24d24ed3b8b293c9e9373f351722833fe6dbbd

  • SHA512

    10e58b3d7cf11ee42453e8dc011231fe324b133bc6e53b23192c4842050da8019b76d2e4bfc9116a87f8048a49311cc4904494044f07e87437b3ab0d5d1b264b

  • SSDEEP

    3072:dFgnyBEiy6GR+btVcyO+nhQBz65/M6If+3Js+3JFkKeTno:dVTbzcQQxBt25

Score
10/10

Malware Config

Extracted

Family

xworm

C2

hellothere12493-49084.portmap.host:49084

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    $phantom-rootkit.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • XClient.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections